CN109600371A - A kind of network layer leakage location and method - Google Patents
A kind of network layer leakage location and method Download PDFInfo
- Publication number
- CN109600371A CN109600371A CN201811499157.8A CN201811499157A CN109600371A CN 109600371 A CN109600371 A CN 109600371A CN 201811499157 A CN201811499157 A CN 201811499157A CN 109600371 A CN109600371 A CN 109600371A
- Authority
- CN
- China
- Prior art keywords
- detection
- loophole
- module
- server
- network layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Abstract
The invention discloses a kind of network layer leakage location and method, this programme is based on active scan and checks whether system is possible to be attacked, and the behavior attacked system is simulated using program, then analyzes result;Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected, and loophole existing for server itself is quickly scanned using multithreading.Loophole existing for server network network layers itself can quickly be scanned using this programme.
Description
Technical field
The present invention relates to network technologies, and in particular to network security technology.
Background technique
With internet+development, many traditional industries make the transition to internet industry one after another, various websites layers on internet
It is not poor out, with and to be exactly network security problem, hacker attack enterprise Web server is oneself to seek its interests, most of to look forward to
Industry never pays attention to network security problem.
However it is directed to server attack, currently used is all addition guard system, all kinds of antivirus softwares.But it is existing at present
The technology of useful cloud or locally-installed securing software filters seldom the type of attack, and lacks real-time statistics user
The data that server is attacked, if user will protect the server of oneself to be typically necessary connection manufacturer, process is cumbersome and ties up
Protect into height.
Summary of the invention
For the problems of existing server security guard technology, a kind of new server security protection side is needed
Case.
For this purpose, the purpose of the present invention is to provide a kind of network layer leakage locations, and provided based on the detection system
Thus a kind of detection method can be realized and quickly scan loophole existing for server network network layers itself, the situation that springs a leak is counted.
In order to achieve the above object, network layer leakage location provided by the invention, including processor, and be stored with
The computer-readable medium of computer program, when the computer program is executed by processor:
It checks whether system is possible to be attacked based on active scan, and simulates the row attacked system using program
Then to analyze result;
Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected,
And loophole existing for server itself is quickly scanned using multithreading.
Further, the detection system main functional modules include port detecting module, weak passwurd scan module, injection
Scan module and web vulnerability scanning module;
The opening imformation of port detecting module quick detection server network network layers external disclosure port;
The dictionary that the weak passwurd scan module is combined based on special common weak password and account, is sent out based on development language
It takes business protocol emulation to log in, simulation, which logins successfully, is identified as weak passwurd;
Data-query interfaces existing for database service port that the injection scan module opens server or web
Injection loophole scanning is carried out, is communicated and submitted the malice constructed to infuse using corresponding agreement for database service port
Enter sentence, if sensitive information can be obtained, is identified as that there are injection loopholes;
The Web vulnerability scanning module crawls all url under domain name by writing crawler, is then put up by calling
Vulnerability database actively initiates http request, detects corresponding url to produce loophole existing for web.
Further, the port detecting module sending and receiving by data packet, different values represents different shapes
State.
Further, the detection system further includes report export module and solution scheme module;
The result that all vulnerability scannings come out is counted and is divided and in the form of report by the report export module
Export;
The solution module is according to the type queries solution library of each loophole.
In order to achieve the above object, network layer leak detection method provided by the invention, comprising:
It checks whether system is possible to be attacked based on active scan, and simulates the row attacked system using program
Then to analyze result;
Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected,
And loophole existing for server itself is quickly scanned using multithreading.
Further, the detection method includes:
(1) scan task is established for server to be detected;
(2) start scan task, start automatically scanning loophole;
(3) detecting server port information and detection service weak passwurd;
(4) detection service device injection loophole.
Further, the detection method after user logs in detection system, fills in server when establishing scan task
IP address or domain name add the information such as port, Mission Profile to establish new task, and relevant information is stored into mysql database
In.
Further, for the detection method in automatically scanning loophole, detection service device whether there is web services first,
Whole url information are crawled to web site using crawler, comprehensive web url and system vulnerability library are established scan task, started multi-thread
Journey is scanned the scanning of task, finally saves scanning result.
Further, the detection method is believed in detecting server port information and detection service weak passwurd from task
IP information is extracted in breath, and the methods of active TCP or UDP are carried out for IP and are scanned, the unlatching of Service-Port is detected
Situation, for server open port in find ssh, ftp, telnet, vnc, mssql, mysql, postgresql, rsh,
Imap, nntp, pcantwhere, pop3, rexec, rlogin, smbnt, smtp, svn, vmauthd, snmp service, and open
Multithreading carries out weak passwurd explosion, finally records explosion situation.
Further, the detection method utilizes the url information searching of crawler offer in detection service device injection loophole
Decanting point, comprehensive sql injecting principle construct malicious code, carry out numeric type, character type, echo, report an error, the inspection of blind note injection mode
It surveys, finally saves result.
Further, further include terminating in scan task in the detection method, return to the step of tasks secure examining report
Suddenly, scanning loophole is classified and is summarized, inquire solution library respectively, generate safety detection report.
The scheme more fully detection service device security breaches that this programme provides, and operate convenient, it can effectively solve the problem that
Existing server is the problems of in terms of security protection.
This programme in specific application, can quickly scan loophole existing for server network network layers itself;And according to need
Will also statistics available spring a leak situation and solution, to prevent hacker attack path.
Detailed description of the invention
The present invention is further illustrated below in conjunction with the drawings and specific embodiments.
Fig. 1 is the composition exemplary diagram of network layer leakage location in present example;
Fig. 2 is the implementation flow chart of network layer Hole Detection in present example.
Specific embodiment
In order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, tie below
Conjunction is specifically illustrating, and the present invention is further explained.
This example is directed to server, and network-based detection technique uses the Network status detection of test object
The scanning modes such as TCP, UDP carry out port scan and survival detection, and after testing, rate of false alarm is very low for scan method;For to leakage
Flexible testing mechanism is set up in hole detection, can advantageously be modified, be deleted, adding information and method in vulnerability database, and using
Loophole existing for the quick scanning server of the mode of multithreading.
Specifically, this programme is based on active scanning techniques, using active, non-destructive method checks system whether have can
It can be attacked;The behavior attacked system is simulated using a series of program, and then result is analyzed;Also directed to
The network hole known establishes common detection vulnerability database, and the different method of different vulnerability exploits is detected, while scan task
Using multithreading to quickly scan loophole existing for server itself.
Referring to Fig. 1 which shows this example gives a kind of system of network layer leakage location based on the above principles
Form exemplary diagram.
The network layer leakage location mainly includes network layer Hole Detection software program, remote server evidence obtaining journey
Sequence is stored in corresponding computer-readable medium, and may operate in corresponding computer equipment, by computer equipment
Processor, which calls, can quickly scan loophole existing for server network network layers itself when executing.
As seen from the figure, which mainly includes that port detecting module 110, weak passwurd scan mould
Block 120, injection scan module 130 and web vulnerability scanning module 140.
Port detecting module 110 is other for the unlatching situation of quick detection server network network layers external disclosure port
Module provides server basis information.It is sending and receiving by data packet that this module, which carries out port detection principle, different
Value represents different states, sends and there are many mode of detection, such as TCP SYN scanning, TCP ACK scanning, TCP FIN scanning
Deng.
Weak passwurd scan module 120 is sent out based on the dictionary that special common weak password and account combine based on development language
Business protocol emulation is taken to log in, simulation logins successfully and is identified as weak passwurd, the service of support have ssh, ftp, telnet, vnc,
mssql、mysql、postgresql、rsh、imap、nntp、pcantwhere、pop3、rexec、rlogin、smbnt、smtp、
svn、vmauthd、snmp。
Inject scan module 130, data query existing for the database service port or web for opening to server
Interface carries out injection loophole scanning, is communicated and submitted the evil constructed using corresponding agreement for database service port
Meaning injection sentence is identified as that there are injection loopholes if sensitive information can be obtained.
Web vulnerability scanning module 140 crawls all url under domain name by writing crawler using active scanning mode,
Then by calling the vulnerability database put up actively to initiate http request, corresponding url is detected to produce loophole existing for web.
Further, network layer Hole Detection program further include: report export module 150 and solution scheme module 160.
Wherein, it reports export module 150, the result that all vulnerability scannings come out is counted and divided and with report
What loophole form export, check local server there are convenient for administrator, each loophole will use solution mould
Block inquires its solution, proposes help for administrator's patching bugs.
Solution module 160, according to the type queries solution library of each loophole, the solution of most of loophole
Be it is similar, the solution of universal class a kind of can be used in the loophole of this series, can establish solution by this principle
Scheme base provides various solutions for report export.
Thus the network layer leakage location constituted is in use, user only needs addition in system to need detection service device
IP address, this system fast automatic can scan loophole existing for server network network layers itself, while statistics available go out to leak
Hole situation can also form solution as needed, prevent hacker attack path.It is online convenient to be realized using this system
Operation, and various detailed statistical data are capable of providing, effectively solve the problems, such as that user needs to protect the various cumbersome of server.
As an example, it is illustratively carried out below using loophole of the Home Network network layers leakage location to server network network layers
The process quickly scanned online.
In this example, network layer leakage location is deployed in 8GB or more memory, and operation Linux system
Hardware environment in.
Referring to fig. 2 which shows this example is based on network layer leakage location and sweeps to server network network layers progress loophole
The implementing procedure retouched, whole flow process include the following steps:
Step 1. user's logging in network layer leakage location.
Step 2. creates scan task, the contents such as corresponding filling server info.
In the step, after user logs in detection system, server ip address is filled in by task module or domain name adds end
The information such as mouth, Mission Profile establish new task, click and start scan button, and relevant information is stored into mysql data by system
In library, and start to start scan module.
Step 3. starts scan task, and safety patrol system starts automatically scanning loophole.
Detection service device whether there is web services first, and the Web vulnerability scanning module in system is using crawler to web net
Station crawls whole url information, and scan task is established in comprehensive web url and system vulnerability library, and starting multithreading is scanned task
Scanning, finally save scanning result.
Step 4. safety patrol system detecting server port information and detection service weak passwurd.
In this step, weak passwurd scan module is called, IP information is extracted from mission bit stream, IP is carried out actively
The methods of TCP or UDP are scanned, and detect the unlatching situation of Service-Port, are sought in the port opened for server
Look for ssh, ftp, telnet, vnc, mssql, mysql, postgresql, rsh, imap, nntp, pcantwhere, pop3,
Rexec, rlogin, smbnt, smtp, svn, vmauthd, snmp service, and open multithreading and carry out weak passwurd explosion, finally
Record explosion situation.
Step 5. safety patrol system detection server injection loophole.
In this step, system calls injection scan module, the url information searching decanting point provided using crawler, such as id=
1.Comprehensive sql injecting principle constructs malicious code, carries out numeric type, character type, echoes, reports an error, the detection of blind note injection mode, most
After save result.
Step 6. scan task terminates and returns to tasks secure examining report.
This step, system call report export module to be classified loophole is scanned and summarized, inquire solution respectively
Library generates safety detection report.
It can be seen that this programme can detection service device security breaches more comprehensively, more rapidly, safer, can effectively solve
Certainly existing server is the problems of in terms of security protection.
Finally it should be noted that the method or particular system unit or its part unit of aforementioned present invention, are pure software
Framework can be laid in tangible media through program code, such as hard disk, disc or any electronic device (such as intelligent hand
Machine, computer-readable storage media), when machine loading procedure code and execute (such as smartphone load and execution),
Machine becomes to carry out the device of the invention.The method and apparatus of aforementioned present invention can also be penetrated with form of program codes
Media are transmitted, if cable, optical fiber or any transmission kenel are transmitted, when program code is by machine (such as smartphone)
It receives, load and execution, machine become to carry out the device of the invention.
The basic principles, main features and advantages of the present invention have been shown and described above.The technology of the industry
Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this
The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes
Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its
Equivalent thereof.
Claims (10)
1. a kind of network layer leakage location, including processor, and it is stored with the computer-readable medium of computer program,
It is characterized in that, when the computer program is executed by processor:
It checks whether system is possible to be attacked based on active scan, and simulates the behavior attacked system using program,
Then result is analyzed;
Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected, and is made
Loophole existing for server itself is quickly scanned with multithreading.
2. network layer leakage location according to claim 1, which is characterized in that the detection system major function mould
Block includes port detecting module, weak passwurd scan module, injection scan module and web vulnerability scanning module;
The opening imformation of port detecting module quick detection server network network layers external disclosure port;
The dictionary that the weak passwurd scan module is combined based on special common weak password and account sends clothes based on development language
Business protocol emulation logs in, and simulation, which logins successfully, is identified as weak passwurd;
Data-query interfaces progress existing for database service port that the injection scan module opens server or web
Injection loophole scanning is communicated and is submitted the malice constructed to inject language for database service port using corresponding agreement
Sentence is identified as that there are injection loopholes if sensitive information can be obtained;
The Web vulnerability scanning module crawls all url under domain name by writing crawler, then by calling the loophole put up
Http request is actively initiated in library, detects corresponding url to produce loophole existing for web.
3. network layer leakage location according to claim 2, which is characterized in that the port detecting module passes through number
According to sending and receiving for packet, different values represents different states.
4. network layer leakage location according to claim 2, which is characterized in that the detection system further includes report
Export module and solution scheme module;
The result that all vulnerability scannings come out is counted and is divided and exported in the form of report by the report export module;
The solution module is according to the type queries solution library of each loophole.
5. a kind of network layer leak detection method characterized by comprising
It checks whether system is possible to be attacked based on active scan, and simulates the behavior attacked system using program,
Then result is analyzed;
Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected, and is made
Loophole existing for server itself is quickly scanned with multithreading.
6. network layer leak detection method according to claim 5, which is characterized in that the detection method includes:
(1) scan task is established for server to be detected;
(2) start scan task, start automatically scanning loophole;
(3) detecting server port information and detection service weak passwurd;
(4) detection service device injection loophole.
7. network layer leak detection method according to claim 6, which is characterized in that the detection method is establishing scanning
When task, after user logs in detection system, fills in server ip address or domain name adds the information such as port, Mission Profile to establish
New task, and relevant information is stored into mysql database.
8. network layer leak detection method according to claim 6, which is characterized in that the detection method is in automatically scanning
When loophole, detection service device whether there is web services first, crawl whole url information, comprehensive web to web site using crawler
Scan task is established in url and system vulnerability library, and starting multithreading is scanned the scanning of task, finally saves scanning result.
9. network layer leak detection method according to claim 6, which is characterized in that the detection method is serviced in detection
When device port information and detection service weak passwurd, IP information is extracted from mission bit stream, and active TCP or UDP are carried out for IP
The methods of be scanned, detect the unlatching situation of Service-Port, for server open port in find ssh, ftp,
telnet、vnc、mssql、mysql、postgresql、rsh、imap、nntp、pcantwhere、pop3、rexec、rlogin、
Smbnt, smtp, svn, vmauthd, snmp service, and open multithreading and carry out weak passwurd explosion, finally record explosion situation.
10. network layer leak detection method according to claim 6, which is characterized in that the detection method takes in detection
When business device injection loophole, the url information searching decanting point provided using crawler, comprehensive sql injecting principle constructs malicious code, into
Line number font character type, is echoed, is reported an error, the detection of blind note injection mode, finally saves result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811499157.8A CN109600371A (en) | 2018-12-08 | 2018-12-08 | A kind of network layer leakage location and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811499157.8A CN109600371A (en) | 2018-12-08 | 2018-12-08 | A kind of network layer leakage location and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109600371A true CN109600371A (en) | 2019-04-09 |
Family
ID=65961544
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811499157.8A Pending CN109600371A (en) | 2018-12-08 | 2018-12-08 | A kind of network layer leakage location and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109600371A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110516441A (en) * | 2019-08-16 | 2019-11-29 | 中国电力科学研究院有限公司 | A kind of intelligence safety protection detection for adopting terminal |
CN111291382A (en) * | 2020-01-22 | 2020-06-16 | 上海电子信息职业技术学院 | Vulnerability scanning system |
CN111447224A (en) * | 2020-03-26 | 2020-07-24 | 江苏亨通工控安全研究院有限公司 | Web vulnerability scanning method and vulnerability scanner |
CN111475817A (en) * | 2020-04-17 | 2020-07-31 | 北京墨云科技有限公司 | Data collection method of automatic penetration test system based on AI |
CN111488588A (en) * | 2020-04-17 | 2020-08-04 | 北京墨云科技有限公司 | Automatic penetration testing method based on AI |
CN111949992A (en) * | 2020-08-17 | 2020-11-17 | 中国工商银行股份有限公司 | Automatic safety monitoring method and system for WEB application program |
CN112637119A (en) * | 2020-11-13 | 2021-04-09 | 北京大米科技有限公司 | Host scanning method and device, storage medium and electronic equipment |
CN113411356A (en) * | 2021-08-23 | 2021-09-17 | 北京华云安信息技术有限公司 | Vulnerability detection method, system, device and computer readable storage medium |
CN114363059A (en) * | 2021-12-31 | 2022-04-15 | 深信服科技股份有限公司 | Attack identification method and device and related equipment |
CN114584342A (en) * | 2022-01-17 | 2022-06-03 | 北京中科微澜科技有限公司 | Network vulnerability identification and detection system based on data analysis |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808093A (en) * | 2010-03-15 | 2010-08-18 | 北京安天电子设备有限公司 | System and method for automatically detecting WEB security |
US8695027B2 (en) * | 2011-06-30 | 2014-04-08 | Mcafee, Inc. | System and method for application security assessment |
CN104063309A (en) * | 2013-03-22 | 2014-09-24 | 南京理工大学常熟研究院有限公司 | Web application program bug detection method based on simulated strike |
CN104363236A (en) * | 2014-11-21 | 2015-02-18 | 西安邮电大学 | Automatic vulnerability validation method |
CN107547473A (en) * | 2016-06-27 | 2018-01-05 | 黑龙江傲立辅龙科技开发有限公司 | A kind of Security Vulnerabilities Scanner System |
CN108712396A (en) * | 2018-04-27 | 2018-10-26 | 广东省信息安全测评中心 | Networked asset management and loophole governing system |
-
2018
- 2018-12-08 CN CN201811499157.8A patent/CN109600371A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808093A (en) * | 2010-03-15 | 2010-08-18 | 北京安天电子设备有限公司 | System and method for automatically detecting WEB security |
US8695027B2 (en) * | 2011-06-30 | 2014-04-08 | Mcafee, Inc. | System and method for application security assessment |
CN104063309A (en) * | 2013-03-22 | 2014-09-24 | 南京理工大学常熟研究院有限公司 | Web application program bug detection method based on simulated strike |
CN104363236A (en) * | 2014-11-21 | 2015-02-18 | 西安邮电大学 | Automatic vulnerability validation method |
CN107547473A (en) * | 2016-06-27 | 2018-01-05 | 黑龙江傲立辅龙科技开发有限公司 | A kind of Security Vulnerabilities Scanner System |
CN108712396A (en) * | 2018-04-27 | 2018-10-26 | 广东省信息安全测评中心 | Networked asset management and loophole governing system |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110516441A (en) * | 2019-08-16 | 2019-11-29 | 中国电力科学研究院有限公司 | A kind of intelligence safety protection detection for adopting terminal |
CN111291382B (en) * | 2020-01-22 | 2022-04-08 | 上海电子信息职业技术学院 | Vulnerability scanning system |
CN111291382A (en) * | 2020-01-22 | 2020-06-16 | 上海电子信息职业技术学院 | Vulnerability scanning system |
CN111447224A (en) * | 2020-03-26 | 2020-07-24 | 江苏亨通工控安全研究院有限公司 | Web vulnerability scanning method and vulnerability scanner |
CN111475817B (en) * | 2020-04-17 | 2023-08-11 | 北京墨云科技有限公司 | Data collection method of automatic penetration test system based on AI |
CN111488588A (en) * | 2020-04-17 | 2020-08-04 | 北京墨云科技有限公司 | Automatic penetration testing method based on AI |
CN111475817A (en) * | 2020-04-17 | 2020-07-31 | 北京墨云科技有限公司 | Data collection method of automatic penetration test system based on AI |
CN111488588B (en) * | 2020-04-17 | 2023-08-11 | 北京墨云科技有限公司 | Automatic penetration test method based on AI |
CN111949992A (en) * | 2020-08-17 | 2020-11-17 | 中国工商银行股份有限公司 | Automatic safety monitoring method and system for WEB application program |
CN111949992B (en) * | 2020-08-17 | 2023-09-29 | 中国工商银行股份有限公司 | Automatic safety monitoring method and system for WEB application program |
CN112637119A (en) * | 2020-11-13 | 2021-04-09 | 北京大米科技有限公司 | Host scanning method and device, storage medium and electronic equipment |
CN113411356A (en) * | 2021-08-23 | 2021-09-17 | 北京华云安信息技术有限公司 | Vulnerability detection method, system, device and computer readable storage medium |
CN113411356B (en) * | 2021-08-23 | 2021-12-10 | 北京华云安信息技术有限公司 | Vulnerability detection method, system, device and computer readable storage medium |
CN114363059A (en) * | 2021-12-31 | 2022-04-15 | 深信服科技股份有限公司 | Attack identification method and device and related equipment |
CN114584342A (en) * | 2022-01-17 | 2022-06-03 | 北京中科微澜科技有限公司 | Network vulnerability identification and detection system based on data analysis |
CN114584342B (en) * | 2022-01-17 | 2024-02-06 | 北京中科微澜科技有限公司 | Network vulnerability recognition and detection system based on data analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109600371A (en) | A kind of network layer leakage location and method | |
US11853434B2 (en) | System and method for creating and executing breach scenarios utilizing virtualized elements | |
US11627160B2 (en) | Intelligent-interaction honeypot for IoT devices | |
CN111400722B (en) | Method, apparatus, computer device and storage medium for scanning small program | |
EP4026297B1 (en) | Honeypots for infrastructure-as-a-service security | |
Zhang et al. | An IoT honeynet based on multiport honeypots for capturing IoT attacks | |
US9473522B1 (en) | System and method for securing a computer system against malicious actions by utilizing virtualized elements | |
RU2657170C2 (en) | Automated safety assessment of business-critical computer systems and resources | |
US7647631B2 (en) | Automated user interaction in application assessment | |
US9336385B1 (en) | System for real-time threat detection and management | |
US7765597B2 (en) | Integrated crawling and auditing of web applications and web content | |
CN113704767A (en) | Vulnerability scanning engine and vulnerability worksheet management fused vulnerability management system | |
Raj et al. | A study on metasploit framework: A pen-testing tool | |
CN108965296A (en) | A kind of leak detection method and detection device for smart home device | |
CN112615863A (en) | Method, device, server and storage medium for resisting attack host | |
CN110099129A (en) | A kind of data transmission method and equipment | |
Göbel et al. | A novel approach for generating synthetic datasets for digital forensics | |
CN110768949B (en) | Vulnerability detection method and device, storage medium and electronic device | |
CN114666104A (en) | Penetration testing method, system, computer equipment and storage medium | |
Fredj | Spheres: an efficient server-side web application protection system | |
Khan et al. | Security assessment of four open source software systems | |
CN112738068B (en) | Network vulnerability scanning method and device | |
CN114036505A (en) | Safety operation and maintenance analysis server, safety operation and maintenance analysis method and computer equipment | |
Bellatriu | Penetration testing automation system | |
Barreiros | Exploring Security Controls for ICS/Scada Environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190409 |